{"id":24024,"date":"2014-06-17T00:43:41","date_gmt":"2014-06-17T04:43:41","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24024"},"modified":"2014-06-17T00:43:41","modified_gmt":"2014-06-17T04:43:41","slug":"hacked-synology-nas-systems-used-in-big-profit-cryptocurrency-mining-scheme","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptocurrency\/hacked-synology-nas-systems-used-in-big-profit-cryptocurrency-mining-scheme.php","title":{"rendered":"Hacked Synology NAS systems used in big-profit cryptocurrency mining scheme"},"content":{"rendered":"<p><p>    News  <\/p>\n<p>    By Lucian Constantin  <\/p>\n<p>    June 16, 2014 03:46 PM ET  <\/p>\n<p>    IDG News Service - A hacker    exploited publicly known vulnerabilities to install malware on    network-attached storage systems manufactured by Synology and    used their computing power to generate Dogecoins, a type of    cryptocurrency.  <\/p>\n<p>    The operation took place during the first months of the year    and is likely the most profitable of its kind to date, earning    the attacker over US$600,000 according to a recent analysis by    researchers from Dell SecureWorks.  <\/p>\n<p>    Using CPUs and GPUs to solve cryptographic problems as part of    cryptocurrency systems is an activity referred to as mining.    Those who perform it -- typically using their own systems --    are automatically rewarded by the system with units or subunits    of that respective currency.  <\/p>\n<p>    At the beginning of February reports    started appearing online from users complaining about    sluggish performance and high CPU usage on their Synology NAS    systems, which have a Linux-based operating system called    DiskStation Manager (DSM) developed by the Taiwan-based    manufacturer.  <\/p>\n<p>    The problems were tracked to an unauthorized application    running on affected systems from a directory called PWNED that    turned out to be a custom version of a cryptocurrency mining    program called CPUMiner specifically compiled for Synology's    DSM OS, the Dell SecureWorks researchers said Friday in a        blog post.  <\/p>\n<p>    An analysis of the rogue program showed that it had been    configured to mine Dogecoin, a peer-to-peer cryptocurrency    similar to Bitcoin that was launched in December 2013.  <\/p>\n<p>    The Dell SecureWorks researchers identified two electronic    wallet addresses associated with the rogue mining activity and    determined that their owner had mined over 500 million    Dogecoins, worth about $620,000, mostly during January and    February.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com\/s\/article\/9249144\/Hacked_Synology_NAS_systems_used_in_big_profit_cryptocurrency_mining_scheme\/RK=0\/RS=KPiP5S_uYV3t7jJqFutD6bzaS7E-\" title=\"Hacked Synology NAS systems used in big-profit cryptocurrency mining scheme\">Hacked Synology NAS systems used in big-profit cryptocurrency mining scheme<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> News By Lucian Constantin June 16, 2014 03:46 PM ET IDG News Service - A hacker exploited publicly known vulnerabilities to install malware on network-attached storage systems manufactured by Synology and used their computing power to generate Dogecoins, a type of cryptocurrency. The operation took place during the first months of the year and is likely the most profitable of its kind to date, earning the attacker over US$600,000 according to a recent analysis by researchers from Dell SecureWorks. Using CPUs and GPUs to solve cryptographic problems as part of cryptocurrency systems is an activity referred to as mining<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[869],"tags":[],"class_list":["post-24024","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24024"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24024"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24024\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}